DeVry University--Rachel Sakhi, Saturday October 2017. Week 7 Discussion: Globalism and Terrorism






Rachel Sakhi







WEEK 7: GLOBALISM AND TERRORISM
Image: "Planet Pluto" || Flickr Images, 2017.
The sun, planets and major moons (2560 res!)WHAT WE DON'T KNOW DOESN'T OR WON'T HURT US?
 
As a child during my years of 4-8 years of age I can recall playing old computerized PAC MAN games in the bedroom of the cousin who was such a geek to me. 

During my childhood years as an 11-12 year old I couldn't get pulled away from the advanced version of computerized gaming--Nintendo's Super Mario Brothers. Sometimes I'd challenge my brother to a game or two. 

Then as I matured during my adolescent years between the ages of 13-16 I can remember relocating, but still finding the equipment to indulge in Nintendo's Sonic the Hedgehog. 

During my adult years between the ages of 19-26 I was no longer interested in playing any of those games as I had become a mother, but I did visit the home of a veteran of the United States Marine Corps who was a 'family man', had siblings, fluently translated Quranic Arabic, and had a rather advanced version of Microsoft's XBOX. The characters on the big screen television could almost jump out at us. 

During my years as a family maid I took care of some kids whereas one of them were always playing online streaming World of Warcraft features. The stream required credit card payments, access to and receivership of telecom globally from adults to children, and children to adults. As I walked past one day I heard something very, very awkward. The word "******" , and the return response of "Michael Jackson". The games can become extremely addictive to certain kids I would imagine. 

The games described above compare and contrasted in type or socializing capacity is an example of how people can utilize a tool of telecommunications to send, receive, and keep in touch with one another from very far distances. This ability is called globalization. 

Cloud computing, mobile cloud computing, and cloud storage has become famous as well for the reduction of utilizing server space, and for the organization and storage of big data. The solution has begun to service massive companies worldwide in the desperation to keep advancing with convenience, technology, and most importantly efficiency. To get it now, get it fast, and make money. This type of mind set drives the motivation of cyber crime, technology-based crime, and intentional control of information that isn't necessarily under the ownership of the people seeking to possess it. This leads to the violation of laws that protect privacy, transactions, and overall communication.

"Globalization has resulted in a collapse of time and space, in that events that take place around the world are immediately known to distant people" (Schmalleger, 2014).
Image: "International Space Station" [ISS] || Flickr Images, 2017.
ISS
Terrorism is to utilize force and threat of a credible source to accomplish attack upon another source. Violence is following through on the threats made and causing damage. Globalization is the art of bringing things far apart together via telecom tools and advancements. The international space station for NASA is an example of globalization, whereas sending or receiving information is accomplished utilizing hardware, software, and the act of linking any form of communication to another distant location.
  • Rumor has it that some members of a Korean government was banned from utilizing the internet associated to any business inside the United States of America: Maybe because an internet connection was fed across the ocean from a Korean country into the United States utilizing cloud services to store, capture, and issue internet capabilities that trespass on the United States tax laws and disobey the boundaries of the storage units associated to the International Space Station located in orbit (Anonymous, 2017).
Citation 

Schmalleger, F. J. (2014-01-01). Criminology Today: An Integrative Introduction, 7th Edition. [Bookshelf Online]. Retrieved from https://online.vitalsource.com/#/books/9781323105238/

Edited by Rachel Sakhi on Oct 15 at 2:34am
Reply Reply to Comment

Comments

Popular posts from this blog

Author: Rachel Sakhi--DeVry University, Week #7 || PEDOPHILIA TRAFFICKING AND IDENTITY THEFT - I am an eye-witness to baby trafficking via Facebook From Central America to Los Angeles borders - Baby trade is one of the most fashionable crimes that Los Angeles prides themselves on for a high level of social status.

Issues facing the correctional system: now and in the future. || Author: Rachel Sakhi, DeVry University--JADM Introduction to Corrections

Author: SAKHI, Rachel || DeVry University: ENGL112 - Image: Kurt Cobain, Google Images, 2017. || Gathering the Silver Bullet, Ready for Launch of Presentation: Yes, Welcome back Ms. Rodriguez to the 2nd Week here at DeVry's English 112 fast paced 8 week course. Definitely the Who, What, When, Where, Why, and How strategy is the key success trait utilized by Wilkinson to present the musical biography in chronological order for his potential audience--music lovers.